top of page

Learn Cybersecurity

Introduction to Cybersecurity

Ever wonder how technology professionals build physical computers, upgrade components, configure virtual machines? Sign Up!

Cyber Fundamentals

Cyber Fundamentals: If you’re new to configuring computers, complete Cyber Fundamentals to get an introduction to how computers work! Learn system interfaces, identify and install hardware components, and practice deploying Windows and Linux operating systems to build foundational skills that will kickstart your career in technical operations.

Classroom:

100% Virtual Learning Enviroment

Class Schedule:

Part Time Classes

3 weekday nights - Instruction

1 Weekday night - labs

Every other Saturday 10-2

20 weeks total, 320 hours

Tuition:

$6,500 paid in full by first day of class

$8,500 with financing

$500 deposit

Cyber Security Boot Camp

Ready to launch your career as a Cybersecurity Engineer, or just want to know if this is the right path for you? Check out our courses below to find out where you should start, what you will learn, and what you can expect after you successfully complete each course. Get started exploring personal cybersecurity with beginner-level courses, or take your training to the next level with intermediate and advanced courses available now!

Pivot Tech 20 week Bootcamps

Module 1: 

Timeline: Weeks 1-10

 

  • Deliver remote IT service and support

  • Set up and configure computer virtualization using VirtualBox

  • Deploy an EC2 and Lightsail instance on AWS cloud

  • Respond to, log, track, and resolve support cases in an issue tracking system

  • Apply a standardized troubleshooting and workstation deployment methodology

  • Utilize imaging, backup and recovery tools

  • Perform data restoration, startup repair, and secure disposal

  • Deploy, configure, and troubleshoot Windows 10

  • Configure Microsoft Outlook to connect to Microsoft 365

  • Install, update, troubleshoot, and uninstall software applications

  • Evaluate endpoint performance metrics to identify anomalous readings

  • Monitor and tune endpoint performance

  • Perform IT asset management in a systematic fashion

  • Incorporate infrastructure connectivity concepts including RDP, SSH, and Powershell remote access commands

  • Evaluate and configure network adapter settings

  • Deploy pfSense firewall and establish network connectivity through it

  • Automate tasks in Ubuntu Linux using Bash scripting

  • Practice using Linux and Windows terminal commands

  • Perform basic GitHub operations

Module 2: 

Timeline: Weeks 11-20

 

Systems Administration

  • Agile project management

  • ITIL change management

  • Linux and Windows network services, like AD, DHCP, DNS, email, LDAP, web servers

  • Cloud services

  • Identity management

  • IT infrastructure and systems design

  • Microsoft SQL Server 2019

  • Microsoft Windows Server 2019

  • Patch management

  • Software administration

  • Virtual machine administration

 

Networking

  • Enterprise-grade routers, switches, firewalls

  • Network analyzer tools

  • Network design

  • Network infrastructure troubleshooting

  • Network service administration (TCP/IP, DHCP, DNS)

  • Routing protocols (OSPF, BGP)

  • Virtual private network(VPN) client and tunnel

Scripting & Automation

  • Bash

  • OS task automation

  • Powershell

  • Python

Working on a Computer
IMG_4052.JPG
bottom of page